Daily Shaarli

All links of one day in a single page.

May 7, 2020

Bring back deleted files with lsof - Linux.com

There you are, happily playing around with an audio file you’ve spent all afternoon tweaking, and you’re thinking, “Wow, doesn’t it sound great? Lemme just move it over here.” At that point your subconscious chimes in, “Um, you meant mv, not rm, right?” Oops. I feel your pain — this happens to everyone. But there’s a straightforward method to recover your lost file, and since it works on every standard Linux system, everyone ought to know how to do it.

How and why to properly write copyright statements in your code - … and probably more than what you ever wanted to know about them · Hook’s Humble Homepage

Copyright is automatic (since the Berne convention) and any work of authorship is automatically protected by it – essentially giving the copyright holder1 exclusive power over its work. In order for your downstream to have the rights to use any of your work – be that code, text, images or other media – you need to give them a license to it.

Go · How I Start.

Go is a lovely little programming language designed by smart people you can trust and continuously improved by a large and growing open-source community.

Go is meant to be simple, but sometimes the conventions can be a little hard to grasp. I’d like to show you how I start all of my Go projects, and how to use Go’s idioms. Let’s build a backend service for a web app.

How to create good SSH keys - Seravo

A couple years back we wrote a guide on how to create good OpenPGP/GnuPG keys and now it is time to write a guide on SSH keys for much of the same reasons: SSH key algorithms have evolved in past years and the keys generated by the default OpenSSH settings a few years ago are no longer considered state-of-the-art. This guide is intended both for those completely new to SSH and to those who have already been using it for years and who want to make sure they are following the latest best practices.

Automatically sync all folders in Thunderbird – tiefpunkt tech

The only annoyance was that Thunderbird only ever synced my main Inbox folder, not all subfolders. So I had to go through them manually to check for new email.

How to Setup Two-Factor Authentication (2FA) for SSH on Debian 9 Using Google Authenticator - Vultr.com

There are several ways of logging into a server over SSH. Methods include password login, key-based login and two-factor authentication.
Two-factor authentication is a much better type of protection. In the event that your computer gets compromised, the attacker would still need an access code to login.
In this tutorial, you will learn how to set up two-factor authentication on Debian 9 using Google Authenticator and SSH.

bash - How to specify the private SSH-key to use when executing shell command on Git? - Stack Overflow

Configure which identity-file to use host-wide without further arguments

Strange Loops: Ken Thompson and the Self-referencing C Compiler | ScienceBlogs

The story of the Unix C compiler, and the virtually invisible back-door security hole inserted into it by Ken Thompson - a story he told in his Turing award lecture..